Skip to content

Commit 9096ace

Browse files
authored
Merge pull request #45101 from stevsmit/GH44721
Replaces CSO Operator with Red hat Quay CS Operator
2 parents dd4350f + a1d789a commit 9096ace

8 files changed

+12
-11
lines changed

_attributes/common-attributes.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -126,3 +126,5 @@ endif::[]
126126
:productwinc: Red Hat OpenShift support for Windows Containers
127127
// IBM zSystems
128128
:ibmzProductName: IBM Z
129+
// Red Hat Quay Container Security Operator
130+
:rhq-cso: Red Hat Quay Container Security Operator

modules/security-container-content-inside.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,5 +30,5 @@ scanning features, used directly from {op-system-base} or added to {product-titl
3030
can alert you when
3131
an image you are using has vulnerabilities. OpenSCAP image scanning is
3232
available in {op-system-base} and the
33-
link:https://access.redhat.com/documentation/en-us/red_hat_quay/3/html-single/manage_red_hat_quay/index#container-security-operator-setup[Container Security Operator] can be added
33+
link:https://access.redhat.com/documentation/en-us/red_hat_quay/3/html-single/manage_red_hat_quay/index#container-security-operator-setup[{rhq-cso}] can be added
3434
to check container images used in {product-title}.

modules/security-container-content-scanning.adoc

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,15 +14,15 @@ link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/ht
1414
For example, you can integrate static code analysis tools that test for security
1515
flaws in your source code and software composition analysis tools that identify
1616
open source libraries to provide metadata on those libraries such as
17-
known vulnerabilities.
17+
known vulnerabilities.
1818

1919
[id="quay-security-scan_{context}"]
2020
== Scanning OpenShift images
2121

2222
For the container images that are running in {product-title}
2323
and are pulled from Red Hat Quay registries, you can use an Operator to list the
2424
vulnerabilities of those images. The
25-
link:https://access.redhat.com/documentation/en-us/red_hat_quay/3/html-single/manage_red_hat_quay/index#container-security-operator-setup[Container Security Operator]
25+
link:https://access.redhat.com/documentation/en-us/red_hat_quay/3/html-single/manage_red_hat_quay/index#container-security-operator-setup[{rhq-cso}]
2626
can be added to {product-title} to provide vulnerability reporting
2727
for images added to selected namespaces.
2828

@@ -31,4 +31,3 @@ link:https://access.redhat.com/documentation/en-us/red_hat_quay/3/html-single/ma
3131
In Red Hat Quay, Clair can search for and report vulnerabilities in
3232
images built from {op-system-base}, CentOS, Oracle, Alpine, Debian, and Ubuntu
3333
operating system software.
34-

modules/security-pod-scan-cso.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@
44

55
:_content-type: PROCEDURE
66
[id="security-pod-scan-cso_{context}"]
7-
= Running the Container Security Operator
7+
= Running the {rhq-cso}
88

9-
You can start the Container Security Operator from the {product-title}
9+
You can start the {rhq-cso} from the {product-title}
1010
web console by selecting and installing that Operator from the Operator Hub,
1111
as described here.
1212

modules/security-pod-scan-query-cli.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,10 @@
66
[id="security-pod-scan-query-cli_{context}"]
77
= Querying image vulnerabilities from the CLI
88
Using the `oc` command, you can display information about
9-
vulnerabilities detected by the Container Security Operator.
9+
vulnerabilities detected by the {rhq-cso}.
1010

1111
.Prerequisites
12-
* Be running the Container Security Operator on your
12+
* Be running the {rhq-cso} on your
1313
{product-title} instance
1414
1515
.Procedure

modules/security-registries-quay.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,6 @@ Ongoing integration of Red Hat Quay with {product-title} continues,
4242
with several {product-title} Operators of particular interest.
4343
The link:https://access.redhat.com/documentation/en-us/red_hat_quay/3/html-single/manage_red_hat_quay/index#quay-bridge-operator[Quay Bridge Operator]
4444
lets you replace the internal {product-title} registry with Red Hat Quay.
45-
The link:https://access.redhat.com/documentation/en-us/red_hat_quay/3/html-single/manage_red_hat_quay/index#container-security-operator-setup[Quay Container Security Operator]
45+
The link:https://access.redhat.com/documentation/en-us/red_hat_quay/3/html-single/manage_red_hat_quay/index#container-security-operator-setup[{rhq-cso}]
4646
lets you check vulnerabilities of images running in {product-title} that were
4747
pulled from Red Hat Quay registries.

security/index.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ You can xref:../security/encrypting-etcd.adoc#encrypting-etcd[enable etcd encryp
6565
[id="vulnerability-scanning"]
6666
=== Vulnerability scanning
6767

68-
Administrators can use the Container Security Operator (CSO) to run xref:../security/pod-vulnerability-scan.adoc#pod-vulnerability-scan[vulnerability scans] and review information about detected vulnerabilities.
68+
Administrators can use the {rhq-cso} to run xref:../security/pod-vulnerability-scan.adoc#pod-vulnerability-scan[vulnerability scans] and review information about detected vulnerabilities.
6969

7070
[id="compliance-overview"]
7171
== Compliance overview

security/pod-vulnerability-scan.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ include::_attributes/common-attributes.adoc[]
66

77
toc::[]
88

9-
Using the Container Security Operator (CSO), you can access vulnerability
9+
Using the {rhq-cso}, you can access vulnerability
1010
scan results from the {product-title} web console for container images
1111
used in active pods on the cluster. The CSO:
1212

0 commit comments

Comments
 (0)